Create an Account
username: password:
  MemeStreams Logo

It's always easy to manipulate people's feelings. - Laura Bush


Picture of Decius
Decius's Pics
My Blog
My Profile
My Audience
My Sources
Send Me a Message

sponsored links

Decius's topics
   Sci-Fi/Fantasy Literature
   Sci-Fi/Fantasy Films
   Electronic Music
  Finance & Accounting
  Tech Industry
  Telecom Industry
  Markets & Investing
Health and Wellness
Home and Garden
Current Events
  War on Terrorism
  Cars and Trucks
Local Information
  United States
   SF Bay Area
    SF Bay Area News
  Nano Tech
  Politics and Law
   Civil Liberties
    Internet Civil Liberties
   Intellectual Property
  Computer Security
  High Tech Developments

support us

Get MemeStreams Stuff!

"I don't think the report is true, but these crises work for those who want to make fights between people." Kulam Dastagir, 28, a bird seller in Afghanistan

Documents Shed Light on Border Laptop Searches | American Civil Liberties Union
Topic: Miscellaneous 7:49 am EST, Jan  3, 2015

House’s case provides a perfect example of how the government uses its border search authority to skirt the protections afforded by the Fourth Amendment. The government enjoys wider latitude to search people and their belongings at the border than it possesses elsewhere, for the purpose of protecting our borders. But the settlement documents demonstrate that the seizure of House’s computer was unrelated to border security or customs enforcement. It was simply an opportunity to conduct a suspicionless search that no court would ever have approved inside the country.

The records also show that HSI was acting in cooperation with—and perhaps at the request of—the Department of Justice, the Department of State, and the Army’s Criminal Investigative Division, not to protect our borders but to further a domestic investigation of the WikiLeaks disclosures. House’s connection to Manning through the Bradley Manning Support Network made him a target of that investigation. The government then used its access to airline passenger information to learn when and where David House, and others, would be traveling across our border (see the document here), and laid in wait to seize his computer and other electronic devices.

What we already knew - the border search exemption is used systematically as an end run around the Fourth Amendment.

Documents Shed Light on Border Laptop Searches | American Civil Liberties Union

Katie Moussouris on Twitter:
Topic: Miscellaneous 7:47 am EST, Jan  3, 2015

I really did have to decrypt my HD flying through CDG in France. I really had nothing to hide, but that's not the point, is it?

On the topic of unease...

Katie Moussouris on Twitter:

Topic: Miscellaneous 4:32 pm EST, Jan  2, 2015

I have to admit that I feel a great deal of unease sliding into 2015.

The fact that the Communications Decency Act was overturned on Constitutional grounds sent me on a 20 year misadventure in which I thought that Constitutional rights might matter. We can see now what their limits are.

The NSA operates a nationwide, domestic telecom metadata surveillance system without authorization from Congress. It's clearly unlawful, and that doesn't matter.

Its defenders claim loudly that it is lawful, and loudly attack anyone who knows better, while quietly telling the courts to not actually rule on the statutory question. They never intended to tell us about this program in the first place, and as this is supposed to be a Democracy, the telling us about it is a necessary part of making it lawful. But they didn't tell us, and now that its out anyway, they've been able to keep operating it regardless. Our authorization is obviously not required.

The NSA also monitored the content of all emails and text messages sent in the Salt Lake City area during 2002. Even the thin legal rationalizations propping up the meta-data program don't support that sort of surveillance system, so we don't talk about it.

If we can go on for year after year avoiding the question of what the law actually is, then in the end, the laws are irrelevant. They are an inconvenience to be navigated through artful spin. One might even find doing so to be sporting.

I had a brief moment of hope that the recent protests over the deaths of unarmed people at the hands of police would lead to a constructive dialog. Barack Obama finally seemed to be doing something that people put him in office to do. But, that possibility has now past. We've had two innocent officers murdered, and in response a host of guilty ones have literally turned their backs on Democracy.

That is our future. The police turning their backs on the people.

The police and the military are increasingly tribes of their own, separate from the rest of us, using THEIR monopoly on the use of force to negotiate with US for their interests, as it is in every failed state in the world. God forbid there are more attacks on the police - this could get much, much worse.

This year Congress will finally authorize the domestic surveillance program by law, making it a permanent fixture, and opening the door to the deployment of a similar meta-data collection infrastructure in the Internet. A record of every website you click on will be kept for 5 years, just in case you do something wrong, and we want to have a look at what you've been reading about.

The following year, we'll be asked to choose whether we want Jeb Bush or Hillary Clinton to be the next President of the United States, the most authoritarian pair of choices this country has ever seen. Neither will have a problem with selling more armor to the local governments. Neither is going to ratchet down the drug war. Neither will oppose secret domestic surveillance programs. Neither will do anything to contain the influence of special interests. Neither will do things to promote innovation. Both are very likely to involve the country in wars, and with gas prices dropping through the floor, there are going to be plenty of states out there with their backs against the wall - dry powder that could rapidly ignite.

We seem to be at the beginning of a dark time.

NYPD Shooting: Blue Lives Matter - The Atlantic
Topic: Miscellaneous 1:46 pm EST, Jan  2, 2015

When the elected mayor of my city arrived at the hospital, the police officers who presumably serve at the public's leisure turned away in a display that should chill the blood of any interested citizen. The police are not the only embodiment of democratic society. And one does not have to work hard to imagine a future when the agents of our will, the agents whom we created, are in fact our masters. On that day one can expect that the tactics intended for the ghettos will enjoy wider usage.

NYPD Shooting: Blue Lives Matter - The Atlantic

The Awnings of Walmart: Adding Ugliness to All the Other Indignities Foisted on the Poor | naked capitalism
Topic: Miscellaneous 10:48 pm EST, Dec 30, 2014

Is it necessary to signal to customers that they are clearly getting a bargain because the Walmart is so cheap that it buys (presumably) off color, icky paint so they can pass the savings off to customers? That’s a branding issue rather than a cost issue, since Walmart buys in such ginormous volumes and bargains so hard that they’d get the finest prices on whatever they purchased, including paint.

I've thought this myself - I live next door to a Walmart and I shop there more then I otherwise would as a consequence. Walmart is unnecessarily ugly. Why? Is it focus groups? Is it that the poor are conditioned to think that ugly things are appropriate for them?

The Awnings of Walmart: Adding Ugliness to All the Other Indignities Foisted on the Poor | naked capitalism

International Law and Cyber Attacks: Sony v. North Korea | Just Security
Topic: Miscellaneous 8:32 am EST, Dec 20, 2014

This is the most informed view you'll find anywhere regarding the legality of a "proportional response" by the United States to the SONY breach.

The commission of an internationally wrongful act entitles an injured State to engage in “countermeasures” under the law of State responsibility, as captured in Article 22 and 49-54 of the Articles on State Responsibility. Countermeasures are actions by an injured State that breach obligations owed to the “responsible” State (the one initially violating its legal obligations) in order to persuade the latter to return to a state of lawfulness. Thus, if the cyber operation against Sony is attributable to North Korea and breached U.S. sovereignty, the United States could have responded with countermeasures, such as a “hack back” against North Korean cyber assets. Indeed, it may still enjoy the right to conduct countermeasures, either because it is reasonable to conclude that the operation is but the first blow in a campaign consisting of multiple cyber operations or based on certain technical rules relating to reparations. It must be cautioned that the right to take countermeasures is subject to strict limitations dealing with such matters as notice, proportionality, and timing. Moreover, they are only available against States and the prevailing view is that a countermeasure may not rise to the level of a use of force.

International Law and Cyber Attacks: Sony v. North Korea | Just Security

FYI I'm speaking at: ShmooCon 2015 - January 16-18
Topic: Miscellaneous 3:21 pm EST, Dec 18, 2014

Deception for the Cyber Defender: To Err is Human; to Deceive, Divine
Tom Cross, David Raymond, and Gregory Conti

Since the first conflict between man, deception has played an integral role. Today on the network battlefield attackers enjoy many advantages and frequently employ deception as a powerful tool to accomplish their objectives. In this talk we discuss how to turn the tables on the attacker and employ deception strategies that deceive both human attackers and the code they employ to best defend your assets. This talk isn’t about social engineering or honeypots, but instead carefully analyzes dozens of deception techniques and how they can be woven together into a deception strategy that increases your defensive posture. We do so by mapping traditional and well-developed military battlefield deception techniques and principles onto the cyber domain. We’ll intersperse historical examples from military deception operations as well as provide new concepts for deception on the geographic, physical (OSI Layer 1), Logical (OSI Layer 2-7), persona, and supervisory planes that comprise the operational cyber environment. You’ll leave this talk inspired and armed to better defend your networks, systems, and people while forcing your attackers off balance.

Tom Cross is CTO at Drawbridge Networks. Previously he was the Director of StealthWatch Labs at Lancope and manager of X­Force Research at IBM/ISS. He has spoken at numerous security conferences, including Black Hat, DEFCON, CyCon, HOPE and RSA.

David Raymond is an Associate Professor at West Point where he teaches cybersecurity and coaches the CTF Team. He is an Army officer with a unique mix of experience in armored maneuver warfare and Army automation.

Greg Conti is Director of the Army Cyber Institute at West Point. He has spoken at Black Hat, DEFCON, ShmooCon, and RSA.

FYI I'm speaking at: ShmooCon 2015 - January 16-18

Eric Garner, criminalized to death - The Washington Post
Topic: Miscellaneous 11:22 pm EST, Dec 10, 2014

The scandal of mass incarceration is partly produced by the frivolity of the political class, which uses the multiplication of criminal offenses as a form of moral exhibitionism. This, like Eric Garner’s death, is a pebble in the mountain of evidence that American government is increasingly characterized by an ugly and sometimes lethal irresponsibility.

George Will seems to be optimistic that something is going to change. I wish that I shared his optimism. I do not.

Eric Garner, criminalized to death - The Washington Post

Chris Rock Stopped Performing for Students Because Everything Offends Them - Hit & Run :
Topic: Miscellaneous 11:28 pm EST, Dec  1, 2014

I stopped playing colleges, and the reason is because they’re way too conservative.

In their political views?

Not in their political views — not like they’re voting Republican — but in their social views and their willingness not to offend anybody. Kids raised on a culture of “We’re not going to keep score in the game because we don’t want anybody to lose.” Or just ignoring race to a fault. You can’t say “the black kid over there.” No, it’s “the guy with the red shoes.” You can’t even be offensive on your way to being inoffensive.

When did you start to notice this?

About eight years ago. Probably a couple of tours ago. It was just like, This is not as much fun as it used to be. I remember talking to George Carlin before he died and him saying the exact same thing.

Chris Rock Stopped Performing for Students Because Everything Offends Them - Hit & Run :

Reading between the lines of the UK leadership's call for mass surveillance.
Topic: Miscellaneous 3:17 pm EST, Nov 28, 2014

This is how the case for mass surveillance is being made in the UK.

Facebook is used by millions in the UK, but they paid not a single penny in UK tax in 2012.

First, a cheap shot. Does the UK expect every website in the world that their citizens use to pay them taxes?!

Even worse, they refuse to recognise UK legislation requiring them to provide our agencies with the content of communications on their networks when served with a UK interception warrant.

Then, a lie. Of course Facebook responds to UK intercept warrants.

The problem that this story is complaining about is the fact that Facebook doesn't perform mass monitoring of the content of private communications between users and report those conversations to the authorities.

As we have seen with the killers of Lee Rigby, this stance can have disastrous consequences.

Apparently the killers of Lee Rigby discussed their extremism in private conversations on Facebook.

Facebook and the other providers like to defend their non-compliance with excuses about the need to protect privacy and maintain the rights of their users. But this kind of pseudo-libertarianism is profoundly unconvincing.

After all, in cases of child pornography and exploitation, these internet companies are only too willing to pass on information to law enforcement authorities. So why is the same logic not applied to terrorist activities, where innocent lives are also at stake?

Indeed Mark Field MP, a member of the Commons Intelligence and Security Committee, has rightly said this week that ‘if Adebowale had been preparing a paedophile attack, not a terrorist one, the authorities would have been alerted’.

Internet companies like Google and Facebook monitor the content of private communications for file transfers, and they check the hashes of those files against a list of known child porn images for matches. This practice is defended based on its narrowness, but it raises a variety of concerns, and you're looking at one of them. Once you pierce the veil of private conversations and start reporting their content to the government, you open up a slippery slope that many people are eager to slide down. If Google and Facebook monitor private conversations for this one thing, then people might ask why they don't monitor those conversations for other things. General searches of language that seems extremist is much more broad than file hash comparisons for known child pornography, and much more prone to false positives and misinterpretations.

If Facebook and Google are shamed into complying with this kind of demand, they will have to set up an infrastructure for sifting through everyone's private conversations and flagging discussions for police based on their content. Once that system is established, there is no limit to the purposes for which it might be put. This will be the end of the sanctity of private communications.

Reading between the lines of the UK leadership's call for mass surveillance.

(Last) Newer << 1 - 2 - 3 - 4 - 5 - 6 - 7 ++ 17 >> Older (First)
Powered By Industrial Memetics